SCIENCE CHINA Information Sciences, Volume 59, Issue 6: 062304(2016) https://doi.org/10.1007/s11432-015-5401-z

Cooperative beamforming design for physical-layer security of multi-hop MIMO communications

More info
  • ReceivedMay 26, 2015
  • AcceptedJun 30, 2015
  • PublishedSep 7, 2015


The security issue is critically important for wireless communications, especially for multi-hop communications. In this paper, we propose a cooperative secrecy beamforming scheme for a multi-hop MIMO communication network, in which there is a single-antenna source, multiple multi-antenna relays and a single-antenna destination. Moreover, two types of eavesdroppers exist in the network, one of which has known channel state information (CSI), while the other not. To achieve security communications, in our work null-space beamforming and artificial noise beamforming are jointly optimized to improve the secrecy rate of the multi-hop network. In nature, the joint optimization is nonconvex and challenging. Exploiting its structure, the considered optimization problem is decoupled into a series of subproblems that can be efficiently solved based on convex optimization theory. Finally, some numerical experiment results are provided to assess the performance of the proposed secrecy beamforming design.

Funded by

National Natural Science Foundation of China(61371075)

National Natural Science Foundation of China(61421001)

111 Project of China(B14010)



This work was supported by National Natural Science Foundation of China (Grant Nos. 61371075, 61421001) and 111 Project of China (Grant No. B14010).


[1] Xing C W, Ma S D, Wu Y C. IEEE Trans Signal Process, 2010, 58: 2273-2283 Google Scholar

[2] Rong Y, Hua Y. IEEE Trans Wirel Commun, 2009, 8: 6068-6077 Google Scholar

[3] Xing C W, Xia M, Gao F, et al. IEEE J Sele Area Commun, 2012, 30: 1370-1382 Google Scholar

[4] Telatar I E. Eur Trans Telecommun, 1999, 10: 585-595 Google Scholar

[5] Zhu F, Gao F, Yao M, et al. IEEE Trans Signal Process, 2014, 62: 6391-6401 Google Scholar

[6] Li Z, Trappe W, Yates R. Secret communication via multi-antenna transmission. In: Proceedings of 41st Conf Inf Sci Syst, Baltimore, 2007. 905--910. Google Scholar

[7] Ni J Q, Fei Z S, Xing C W, et al. Int J Antenn Propag, 2013, 2013: 546260-6401 Google Scholar

[8] Lindblom J, Karipidis E. Closed-form parameterization of the pareto boundary for the two-user MISO interference channel. In: Proceedings of IEEE Int Conf Acoustics, Speech, and Signal Processing, Prague, 2011. 3372--3375. Google Scholar

[9] Chen L, Wong K K, Chen H. IEEE Commun Lett, 2011, 15: 314-316 Google Scholar

[10] Wang C, Liu J, Dong Z. Multi-hop collaborative relay beamforming. In: Proceedings of IEEE Vehicular Technology Conference, Las Vegas, 2013. 1--5. Google Scholar

[11] Shannon C E. Bell Syst Tech J, 1949, 28: 656-715 Google Scholar

[12] Wyner A D. Bell Sys Tech J, 1975, 54: 1355-1387 Google Scholar

[13] Dai B, Ma Z. Achievable rate-equivocation regions for relay broadcast channels with confidential messages. In: Proceedings of ISITA, Melbourne, 2014. 393--397. Google Scholar

[14] Leung-Yan-Cheong S, Hellman M E. IEEE Trans Inf Theory, 1978, 24: 451-456 Google Scholar

[15] Jorswieck A E, Mochaourab R. Secrecy rate region of MISO interference channel: pareto boundary and non-cooperative games. In: Proceedings of international ITG workshop on smart Antennas, Berlin, 2009. 1--8. Google Scholar

[16] Fei Z S, Ni J Q, Zhao D, et al. Sci China Inf Sci, 2014, 57: 102302-456 Google Scholar

[17] Mu P C, Wang H M, Yin Q Y. Improving the secrecy rate of wireless SIMO systems via two-step transmission. In: Proceedings of Globecom Workshops, Atlanta, 2013. 1280--1285. Google Scholar

[18] Wang Y W, Yu F R, Tang H, et al. IEEE Trans Wirel Commun, 2014, 13: 1616-1627 Google Scholar

[19] Luan T, Gao F, Zhang X. IEEE Trans Wirel Commun, 2012, 11: 3090-3100 Google Scholar

[20] Wang H M, Yin Q Y. Improving the physical-layer security of wireless two-way relaying via analog network coding. In: Proceedings of Global Telecommunications Conference, Houston, 2011. 5--9. Google Scholar

[21] Wang H M, Luo M, Yin Q Y. IEEE Trans Inf Foren Secur, 2013, 8: 2007-2020 Google Scholar

[22] Khisti A, Wornell G. IEEE Trans Inf Theory, 2010, 56: 5515-5532 Google Scholar

[23] Tekin E, Yener A. IEEE Trans Inf Theory, 2008, 54: 2735-2751 Google Scholar

[24] Zhang Z, Long K, Wang J, et al. IEEE Commun Surv Tut, 2014, 16: 513-537 Google Scholar

[25] Zhang Z, Long K, Wang J. IEEE Wirel Commun, 2013, 20: 36-42 Google Scholar

[26] Vaikundam G, Sudha G F. Distributed beamforming for randomly distributed sensors using bisection method and dynamic programming technique. In: Proceedings of IEEE Int Conf CONECCT, Bangalore, 2013. 1--6. Google Scholar

[27] Michael G, Stephen B. CVX Users' Guide for CVX version 1.21, 1996. Google Scholar

[28] Ekrem E, Ulukus S. J Commun Netw, 2010, 12: 411-432 Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号